ONION Routing - Jovial learning
IMPORTANT BENEFIT OF ONION
ONION AND COMPUTERS
 PROVIDES FREEDOM TO USERS OF COMPUTER
ANONYMITY ↔ GOSSIPS
WHY ANONYMITY IS PRACTICED IN
NETWORKS ?
 Privacy
 Intelligence sectors
 Data Security
Anonymous Communication Protocols
 Mix Networks (1981)
 Dining cryptographers (1988)
 Onion routing (1999)
 Anonymous buses (2002)
 Crowds (1998)
 PipeNet (1998)
 Xor-trees (2000)
4
 Hordes (2002)
 Salsa (2006)
 ISDN,pool,
Stop-and-Go,
timed,cascade
mixes
 etc.
HOW ONION ROUTING WORKS ?
 CORE IDEA: MIX NETWORKS
ONION ROUTING PHASES:
 Setup
 Transmission
 Teardown
ONION ROUTING HIDES SENDING HOST AND THE RECEIVING HOST
THIS IS ANONYMITY !!!
SETUP PHASE
1. CREATE from U /CREATED (ACK from 1)
2. EXTEND/EXTENDED
3. [Repeat with layer of encryption]
[l2,CREATED]
u 1 2 3
15
TRANSMISSION PHASE
 Exchanging messages in the path setup during the setup phase
TEARDOWN PHASE
 After the successful delivery of message, the setup path will be destroyed.
 FOR EACH BLOCK OF MESSAGE, A NEW CIRCUIT IS FORMED BETWEEN THE
SOURCE AND THE DESTINATION.
How Onion Routing Works
User u running client Internet destination d
Routers running servers
u d
1 2
3
4
5
9
How Onion Routing Works
u d
1. u creates l-hop circuit through routers
1 2
3
4
5
9
How Onion Routing Works
u d
1. u creates l-hop circuit through routers
1 2
3
4
5
9
How Onion Routing Works
u d
1. u creates l-hop circuit through routers
1 2
3
4
5
9
How Onion Routing Works
u d
1. u creates l-hop circuit through routers
2. u opens a stream in the circuit to d
1 2
3
4
5
9
How Onion Routing Works
u d
1. u creates l-hop circuit through routers
2. u opens a stream in the circuit to d
3. Data are exchanged
{{{m}3}4}1
1 2
3
4
5
9
How Onion Routing Works
u d
1. u creates l-hop circuit through routers
2. u opens a stream in the circuit to d
3. Data are exchanged
{{m}3}4
1 2
3
4
5
9
How Onion Routing Works
u d
1. u creates l-hop circuit through routers
2. u opens a stream in the circuit to d
3. Data are exchanged
{m}3
1 2
3
4
5
9
How Onion Routing Works
u d
1. u creates l-hop circuit through routers
2. u opens a stream in the circuit to d
3. Data are exchanged
m
1 2
3
4
5
9
How Onion Routing Works
u d
1. u creates l-hop circuit through routers
2. u opens a stream in the circuit to d
3. Data are exchanged
m’
1 2
3
4
5
9
How Onion Routing Works
u d
1. u creates l-hop circuit through routers
2. u opens a stream in the circuit to d
3. Data are exchanged
{m’}3
1 2
3
4
5
9
How Onion Routing Works
u d
1. u creates l-hop circuit through routers
2. u opens a stream in the circuit to d
3. Data are exchanged
{{m’}3}4
1 2
3
4
5
9
How Onion Routing Works
u d
1. u creates l-hop circuit through routers
2. u opens a stream in the circuit to d
3. Data are exchanged
{{{m’}3}4}1
1 2
3
4
5
9
How Onion Routing Works
u d
1. u creates l-hop circuit through routers
2. u opens a stream in the circuit to d
3. Data are exchanged.
4. Stream is closed.
1 2
3
4
5
9
How Onion Routing Works
u
1. u creates l-hop circuit through routers
2. u opens a stream in the circuit to d
3. Data are exchanged.
4. Stream is closed.
5. Circuit is changed every few minutes.
1 2
3
4
5
d
9
THANK YOU
For more information visit my blog pingtheprotocols.blogspot.com

More Related Content

PPTX
The Onion Routing (TOR)
PDF
TOR... ALL THE THINGS
PDF
Introduction to Tor
PPTX
Tor the onion router
PPTX
Onion protocol
PPTX
Tor the onion router
PPTX
How TOR works?
The Onion Routing (TOR)
TOR... ALL THE THINGS
Introduction to Tor
Tor the onion router
Onion protocol
Tor the onion router
How TOR works?

What's hot (20)

PPT
PPTX
Anonymity Systems: Tor
PPTX
Tor Project and The Darknet
PPTX
Onion routing and tor: Fundamentals and Anonymity
PPTX
Introduction to anonymity network tor
PPTX
Acpe 2014 Internet Anonymity Using Tor
PPT
Hacking Tor ( How does Tor work ?)
PPT
Tor Presentation
PPT
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
PDF
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
PPT
Anonymous Connections And Onion Routing
PPTX
Tor browser
PPTX
TOR: The Onion Router
PPTX
Tor: The Second Generation Onion Router
PPTX
Tor Pivoting Networks Share
PPTX
TOR NETWORK
PPTX
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
PPTX
Tor network seminar by 13504
PPTX
Anonymity Systems: Tor
Tor Project and The Darknet
Onion routing and tor: Fundamentals and Anonymity
Introduction to anonymity network tor
Acpe 2014 Internet Anonymity Using Tor
Hacking Tor ( How does Tor work ?)
Tor Presentation
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Tor - Using alternative networks to protect your online privacy, by Tobias Cl...
Anonymous Connections And Onion Routing
Tor browser
TOR: The Onion Router
Tor: The Second Generation Onion Router
Tor Pivoting Networks Share
TOR NETWORK
AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environ...
Tor network seminar by 13504
Ad

Similar to ONION Routing - Jovial learning (20)

PPT
Onion Routing.ppt
PDF
Anonymity in the Web based on Routing Protocols
PDF
Why and How to use Onion Networking - #EMFCamp2018
PPTX
PDF
PDF
Setting Up .Onion Addresses for your Enterprise, v3.5
PPT
Day 8 1 introducing routing n
PPT
Routing
PDF
routing
PPT
Routing
PDF
Iaetsd a layered security approach through femto cell using
PPT
Unit i packet switching networks
PPTX
Overlay networks
PPT
PPTX
Network the 4th layer
PPTX
PPT
6.Routing
PPT
Chapter_3_Networking.ppt
PPT
Chapter_3_Networking.ppt
Onion Routing.ppt
Anonymity in the Web based on Routing Protocols
Why and How to use Onion Networking - #EMFCamp2018
Setting Up .Onion Addresses for your Enterprise, v3.5
Day 8 1 introducing routing n
Routing
routing
Routing
Iaetsd a layered security approach through femto cell using
Unit i packet switching networks
Overlay networks
Network the 4th layer
6.Routing
Chapter_3_Networking.ppt
Chapter_3_Networking.ppt
Ad

Recently uploaded (20)

PPTX
PORTFOLIO SAMPLE…….………………………………. …pptx
PDF
Virtual Guard Technology Provider_ Remote Security Service Solutions.pdf
PPTX
IT-Human Computer Interaction Report.pptx
PDF
Slides World Games Great Redesign Eco Economic Epochs.pdf
PDF
Lesson.-Reporting-and-Sharing-of-Findings.pdf
PDF
ilide.info-huawei-odn-solution-introduction-pdf-pr_a17152ead66ea2617ffbd01e8c...
PPTX
北安普顿大学毕业证UoN成绩单GPA修改北安普顿大学i20学历认证文凭
PDF
JuanConnect E-Wallet Guide for new users.pdf
PPTX
using the citation of Research to create a research
PPTX
Introduction: Living in the IT ERA.pptx
PPTX
Networking2-LECTURE2 this is our lessons
PPSX
AI AppSec Threats and Defenses 20250822.ppsx
PPTX
最新版美国埃默里大学毕业证(Emory毕业证书)原版定制文凭学历认证
PPTX
购买林肯大学毕业证|i20Lincoln成绩单GPA修改本科毕业证书购买学历认证
PDF
KEY COB2 UNIT 1: The Business of businessĐH KInh tế TP.HCM
PDF
Computer Networking, Internet, Casting in Network
PPTX
WEEK 15.pptx WEEK 15.pptx WEEK 15.pptx WEEK 15.pptx
PDF
The_Decisive_Battle_of_Yarmuk,battle of yarmuk
PDF
healthwealthtech4all-blogspot-com-2025-08-top-5-tech-innovations-that-will-ht...
DOCX
MLS 113 Medical Parasitology (LECTURE).docx
PORTFOLIO SAMPLE…….………………………………. …pptx
Virtual Guard Technology Provider_ Remote Security Service Solutions.pdf
IT-Human Computer Interaction Report.pptx
Slides World Games Great Redesign Eco Economic Epochs.pdf
Lesson.-Reporting-and-Sharing-of-Findings.pdf
ilide.info-huawei-odn-solution-introduction-pdf-pr_a17152ead66ea2617ffbd01e8c...
北安普顿大学毕业证UoN成绩单GPA修改北安普顿大学i20学历认证文凭
JuanConnect E-Wallet Guide for new users.pdf
using the citation of Research to create a research
Introduction: Living in the IT ERA.pptx
Networking2-LECTURE2 this is our lessons
AI AppSec Threats and Defenses 20250822.ppsx
最新版美国埃默里大学毕业证(Emory毕业证书)原版定制文凭学历认证
购买林肯大学毕业证|i20Lincoln成绩单GPA修改本科毕业证书购买学历认证
KEY COB2 UNIT 1: The Business of businessĐH KInh tế TP.HCM
Computer Networking, Internet, Casting in Network
WEEK 15.pptx WEEK 15.pptx WEEK 15.pptx WEEK 15.pptx
The_Decisive_Battle_of_Yarmuk,battle of yarmuk
healthwealthtech4all-blogspot-com-2025-08-top-5-tech-innovations-that-will-ht...
MLS 113 Medical Parasitology (LECTURE).docx

ONION Routing - Jovial learning

  • 3. ONION AND COMPUTERS  PROVIDES FREEDOM TO USERS OF COMPUTER
  • 5. WHY ANONYMITY IS PRACTICED IN NETWORKS ?  Privacy  Intelligence sectors  Data Security
  • 6. Anonymous Communication Protocols  Mix Networks (1981)  Dining cryptographers (1988)  Onion routing (1999)  Anonymous buses (2002)  Crowds (1998)  PipeNet (1998)  Xor-trees (2000) 4  Hordes (2002)  Salsa (2006)  ISDN,pool, Stop-and-Go, timed,cascade mixes  etc.
  • 7. HOW ONION ROUTING WORKS ?  CORE IDEA: MIX NETWORKS ONION ROUTING PHASES:  Setup  Transmission  Teardown ONION ROUTING HIDES SENDING HOST AND THE RECEIVING HOST THIS IS ANONYMITY !!!
  • 8. SETUP PHASE 1. CREATE from U /CREATED (ACK from 1) 2. EXTEND/EXTENDED 3. [Repeat with layer of encryption] [l2,CREATED] u 1 2 3 15
  • 9. TRANSMISSION PHASE  Exchanging messages in the path setup during the setup phase
  • 10. TEARDOWN PHASE  After the successful delivery of message, the setup path will be destroyed.  FOR EACH BLOCK OF MESSAGE, A NEW CIRCUIT IS FORMED BETWEEN THE SOURCE AND THE DESTINATION.
  • 11. How Onion Routing Works User u running client Internet destination d Routers running servers u d 1 2 3 4 5 9
  • 12. How Onion Routing Works u d 1. u creates l-hop circuit through routers 1 2 3 4 5 9
  • 13. How Onion Routing Works u d 1. u creates l-hop circuit through routers 1 2 3 4 5 9
  • 14. How Onion Routing Works u d 1. u creates l-hop circuit through routers 1 2 3 4 5 9
  • 15. How Onion Routing Works u d 1. u creates l-hop circuit through routers 2. u opens a stream in the circuit to d 1 2 3 4 5 9
  • 16. How Onion Routing Works u d 1. u creates l-hop circuit through routers 2. u opens a stream in the circuit to d 3. Data are exchanged {{{m}3}4}1 1 2 3 4 5 9
  • 17. How Onion Routing Works u d 1. u creates l-hop circuit through routers 2. u opens a stream in the circuit to d 3. Data are exchanged {{m}3}4 1 2 3 4 5 9
  • 18. How Onion Routing Works u d 1. u creates l-hop circuit through routers 2. u opens a stream in the circuit to d 3. Data are exchanged {m}3 1 2 3 4 5 9
  • 19. How Onion Routing Works u d 1. u creates l-hop circuit through routers 2. u opens a stream in the circuit to d 3. Data are exchanged m 1 2 3 4 5 9
  • 20. How Onion Routing Works u d 1. u creates l-hop circuit through routers 2. u opens a stream in the circuit to d 3. Data are exchanged m’ 1 2 3 4 5 9
  • 21. How Onion Routing Works u d 1. u creates l-hop circuit through routers 2. u opens a stream in the circuit to d 3. Data are exchanged {m’}3 1 2 3 4 5 9
  • 22. How Onion Routing Works u d 1. u creates l-hop circuit through routers 2. u opens a stream in the circuit to d 3. Data are exchanged {{m’}3}4 1 2 3 4 5 9
  • 23. How Onion Routing Works u d 1. u creates l-hop circuit through routers 2. u opens a stream in the circuit to d 3. Data are exchanged {{{m’}3}4}1 1 2 3 4 5 9
  • 24. How Onion Routing Works u d 1. u creates l-hop circuit through routers 2. u opens a stream in the circuit to d 3. Data are exchanged. 4. Stream is closed. 1 2 3 4 5 9
  • 25. How Onion Routing Works u 1. u creates l-hop circuit through routers 2. u opens a stream in the circuit to d 3. Data are exchanged. 4. Stream is closed. 5. Circuit is changed every few minutes. 1 2 3 4 5 d 9
  • 26. THANK YOU For more information visit my blog pingtheprotocols.blogspot.com